DynamiQS: Quantum Secure Authentication for Dynamic Charging of Electric Vehicles
- URL: http://arxiv.org/abs/2312.12879v1
- Date: Wed, 20 Dec 2023 09:40:45 GMT
- Title: DynamiQS: Quantum Secure Authentication for Dynamic Charging of Electric Vehicles
- Authors: Tommaso Bianchi, Alessandro Brighente, Mauro Conti,
- Abstract summary: Dynamic Wireless Power Transfer (DWPT) is a novel technology that allows charging an electric vehicle while driving.
Recent advancements in quantum computing jeopardize classical public key cryptography.
We propose DynamiQS, the first post-quantum secure authentication protocol for dynamic wireless charging.
- Score: 61.394095512765304
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: Dynamic Wireless Power Transfer (DWPT) is a novel technology that allows charging an electric vehicle while driving thanks to a dedicated road infrastructure. DWPT's capabilities in automatically establishing charging sessions and billing without users' intervention make it prone to cybersecurity attacks. Hence, security is essential in preventing fraud, impersonation, and user tracking. To this aim, researchers proposed different solutions for authenticating users. However, recent advancements in quantum computing jeopardize classical public key cryptography, making currently existing solutions in DWPT authentication nonviable. To avoid the resource burden imposed by technology upgrades, it is essential to develop post-quantum-resistant solutions. In this paper, we propose DynamiQS, the first post-quantum secure authentication protocol for dynamic wireless charging. DynamiQS is privacy-preserving and secure against attacks on the DWPT. We leverage an Identity-Based Encryption with Lattices in the Ring Learning With Error framework. Furthermore, we show the possibility of using DynamiQS in a real environment, leveraging the results of cryptographic computation on real constrained devices and simulations. DynamiQS reaches a total time cost of around 281 ms, which is practicable in dynamic charging settings (car and charging infrastructure).
Related papers
- Adaptive Quantum-Safe Cryptography for 6G Vehicular Networks via Context-Aware Optimization [4.154839547291294]
We propose an adaptive post-quantum cryptography (PQC) framework that predicts short-term mobility and channel variations.<n>We show that the proposed framework reduces end-to-end latency by up to 27%, lowers communication overhead by up to 65%, and effectively stabilizes cryptographic switching behavior using reinforcement learning.
arXiv Detail & Related papers (2026-02-01T17:11:43Z) - A Fuzzy Logic-Based Cryptographic Framework For Real-Time Dynamic Key Generation For Enhanced Data Encryption [0.24629531282150874]
Brute-force attacks, key compromise, and unauthorized access have become highly common cyber threats.<n>This research presents a novel fuzzy logic-based cryptographic framework that dynamically generates encryption keys in real-time.
arXiv Detail & Related papers (2025-11-18T04:34:31Z) - Addressing Weak Authentication like RFID, NFC in EVs and EVCs using AI-powered Adaptive Authentication [0.0]
The rapid expansion of the Electric Vehicles (EVs) and Electric Vehicle Charging Systems (EVCs) has introduced new cybersecurity challenges.<n>Traditional authentication mechanisms like Radio Frequency Identification (RFID) and Near Field Communication (NFC) rely on static identifiers and weak encryption.<n>This study explores an AI-powered adaptive authentication framework designed to overcome these shortcomings by integrating machine learning, anomaly detection, behavioral analytics, and contextual risk assessment.
arXiv Detail & Related papers (2025-08-26T22:54:24Z) - Passive Hack-Back Strategies for Cyber Attribution: Covert Vectors in Denied Environment [0.2538209532048867]
This paper examines the strategic value of passive hack-back techniques that enable covert attribution and intelligence collection without initiating direct offensive actions.<n>Key vectors include tracking beacons, honeytokens, environment-specific payloads, and supply-chain-based traps embedded within exfiltrated or leaked assets.<n>The paper also explores the role of Artificial Intelligence (AI) in enhancing passive hack-back operations.
arXiv Detail & Related papers (2025-08-17T16:43:23Z) - Performance and Storage Analysis of CRYSTALS Kyber as a Post Quantum Replacement for RSA and ECC [49.1574468325115]
CRYSTALS-Kyber is a post-quantum cryptographic solution standardized by NIST in 2022.<n>This study evaluates Kyber's practical viability through performance testing across various implementation schemes.
arXiv Detail & Related papers (2025-08-03T09:53:45Z) - CANDoSA: A Hardware Performance Counter-Based Intrusion Detection System for DoS Attacks on Automotive CAN bus [45.24207460381396]
This paper presents a novel Intrusion Detection System (IDS) designed for the Controller Area Network (CAN) environment.<n>A RISC-V-based CAN receiver is simulated using the gem5 simulator, processing CAN frame payloads with AES-128 encryption as FreeRTOS tasks.<n>Results indicate that this approach could significantly improve CAN security and address emerging challenges in automotive cybersecurity.
arXiv Detail & Related papers (2025-07-19T20:09:52Z) - Securing Transformer-based AI Execution via Unified TEEs and Crypto-protected Accelerators [19.93096649006403]
Machine learning runs on untrusted cloud infrastructure, exposing data and models to potential breaches.<n>Running model inference entirely within trusted execution environments (TEEs) is subject to non-trivial slowdown.<n>We propose TwinShield, a framework enabling secure Transformer inference in heterogeneous TEE and accelerator systems.
arXiv Detail & Related papers (2025-07-04T03:52:53Z) - Physical-Layer Signal Injection Attacks on EV Charging Ports: Bypassing Authentication via Electrical-Level Exploits [3.6297580775927933]
We investigate the security of major charging protocols such as SAE J1772, CCS, IEC 61851, GB/T 20234, and NACS.<n>By inserting a compact malicious device into the charger connector, attackers can inject fraudulent signals to sabotage the charging process.<n>We propose PORTulator, a proof-of-concept (PoC) attack hardware, including a charger gun plugin device for injecting physical signals and a wireless controller for remote manipulation.
arXiv Detail & Related papers (2025-06-19T15:31:29Z) - DRIFT: Dynamic Rule-Based Defense with Injection Isolation for Securing LLM Agents [52.92354372596197]
Large Language Models (LLMs) are increasingly central to agentic systems due to their strong reasoning and planning capabilities.<n>This interaction also introduces the risk of prompt injection attacks, where malicious inputs from external sources can mislead the agent's behavior.<n>We propose a Dynamic Rule-based Isolation Framework for Trustworthy agentic systems, which enforces both control and data-level constraints.
arXiv Detail & Related papers (2025-06-13T05:01:09Z) - Profiling Electric Vehicles via Early Charging Voltage Patterns [56.4040698609393]
Electric Vehicles (EVs) are rapidly gaining adoption as a sustainable alternative to fuel-powered vehicles.<n>Recent results showed that attackers may steal energy through tailored relay attacks.<n>One countermeasure is leveraging the EV's fingerprint on the current exchanged during charging.
arXiv Detail & Related papers (2025-06-09T12:57:37Z) - EVSOAR: Security Orchestration, Automation and Response via EV Charging Stations [0.0]
Vehicle cybersecurity has emerged as a critical concern, driven by the innovation in the automotive industry.
Current efforts to address these challenges are constrained by the limited computational resources of vehicles.
arXiv Detail & Related papers (2025-03-21T09:48:29Z) - Quantum-enabled framework for the Advanced Encryption Standard in the post-quantum era [0.0]
This paper presents an improved version of the Advanced Encryption Standard (AES) that uses quantum technology to strengthen protection.
The system generates encryption keys using quantum randomness instead of predictable computer algorithms, making keys virtually impossible to guess.
Organizations can implement this solution in stages--starting with hybrid mode for sensitive data while keeping older systems operational.
arXiv Detail & Related papers (2025-02-04T16:11:37Z) - Unique ID based Trust Scheme for Improved IoV Wireless Sensor Network Security Against Power Controlled Sybil Attacks [1.906179410714637]
Wireless sensor networks (WSNs) are widely used in vehicular networks to support Vehicle-to-Everything (V2X) communications.
WSNs face security challenges due to their distributed nature and resource limited modules.
This paper proposes a unique identification based trust path routing scheme (UITrust) to avoid Sybil attacks.
arXiv Detail & Related papers (2024-10-05T07:20:55Z) - Cyber-Physical Authentication Scheme for Secure V2G Transactions [6.649289493897674]
The rapid adoption of electric vehicles (EVs) globally has catalyzed the need for robust cybersecurity measures within vehicle-to-grid (V2G) networks.
This paper proposes a cyber-physical authentication protocol and trading smart contract tailored to plug and charge (PnC) operations within blockchain-based V2G systems.
arXiv Detail & Related papers (2024-09-21T04:03:26Z) - Physical Backdoor Attack can Jeopardize Driving with Vision-Large-Language Models [53.701148276912406]
Vision-Large-Language-models (VLMs) have great application prospects in autonomous driving.
BadVLMDriver is the first backdoor attack against VLMs for autonomous driving that can be launched in practice using physical objects.
BadVLMDriver achieves a 92% attack success rate in inducing a sudden acceleration when coming across a pedestrian holding a red balloon.
arXiv Detail & Related papers (2024-04-19T14:40:38Z) - When Authentication Is Not Enough: On the Security of Behavioral-Based Driver Authentication Systems [53.2306792009435]
We develop two lightweight driver authentication systems based on Random Forest and Recurrent Neural Network architectures.
We are the first to propose attacks against these systems by developing two novel evasion attacks, SMARTCAN and GANCAN.
Through our contributions, we aid practitioners in safely adopting these systems, help reduce car thefts, and enhance driver security.
arXiv Detail & Related papers (2023-06-09T14:33:26Z) - Quantum Encryption in Phase Space for Coherent Optical Communications [0.0]
Quantum Encryption in Phase Space (QEPS) is a physical layer encryption method to secure data over the optical fiber.
We study two preventative measures for different modulation formats which will prevent an eavesdropper from obtaining any data.
arXiv Detail & Related papers (2023-01-15T15:08:53Z) - Reinforcement Learning based Cyberattack Model for Adaptive Traffic
Signal Controller in Connected Transportation Systems [61.39400591328625]
In a connected transportation system, adaptive traffic signal controllers (ATSC) utilize real-time vehicle trajectory data received from vehicles to regulate green time.
This wirelessly connected ATSC increases cyber-attack surfaces and increases their vulnerability to various cyber-attack modes.
One such mode is a'sybil' attack in which an attacker creates fake vehicles in the network.
An RL agent is trained to learn an optimal rate of sybil vehicle injection to create congestion for an approach(s)
arXiv Detail & Related papers (2022-10-31T20:12:17Z) - A Deep Reinforcement Learning-based Adaptive Charging Policy for
Wireless Rechargeable Sensor Networks [14.67786743033424]
Wireless power transfer technology is emerging as a reliable solution for energizing the sensors.
We propose a novel adaptive charging scheme using a deep reinforcement learning (DRL) approach.
Our model can adapt to spontaneous changes in the network topology.
arXiv Detail & Related papers (2022-08-16T16:10:52Z) - Downlink Power Allocation in Massive MIMO via Deep Learning: Adversarial
Attacks and Training [62.77129284830945]
This paper considers a regression problem in a wireless setting and shows that adversarial attacks can break the DL-based approach.
We also analyze the effectiveness of adversarial training as a defensive technique in adversarial settings and show that the robustness of DL-based wireless system against attacks improves significantly.
arXiv Detail & Related papers (2022-06-14T04:55:11Z) - Dynamic Slimmable Network [105.74546828182834]
We develop a dynamic network slimming regime named Dynamic Slimmable Network (DS-Net)
Our DS-Net is empowered with the ability of dynamic inference by the proposed double-headed dynamic gate.
It consistently outperforms its static counterparts as well as state-of-the-art static and dynamic model compression methods.
arXiv Detail & Related papers (2021-03-24T15:25:20Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.